BTEC DIT C3 LAB - User Access Restriction

BTEC DIT C3 LAB - User Access Restriction

10th - 11th Grade

10 Qs

quiz-placeholder

Similar activities

Security 1

Security 1

Authentication and Control

Authentication and Control

Access Control InClass Rvw

Access Control InClass Rvw

Chapter 6

Chapter 6

EOC Quick Review

EOC Quick Review

Cyber Authentication Methods Quiz

Cyber Authentication Methods Quiz

Module 12 (Fundamentals of Cybersecurity)

Module 12 (Fundamentals of Cybersecurity)

Identity and Access Management Quiz

Identity and Access Management Quiz

BTEC DIT C3 LAB - User Access Restriction

BTEC DIT C3 LAB - User Access Restriction

Assessment

Quiz

Computers

10th - 11th Grade

Practice Problem

Medium

Created by

Sarah Rodgers

Used 225+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Why are access levels useful?

They give everyone access to all parts of the network

They give everyone 'download' access to the network

They control the level of access a user has to the network

They stop everyone in the organisation from accessing the system

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of a strong password?

JoeBloggs90

1990Joe

JO3_Blo66s

BloggsJ1990

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

How do you make a login secure? (Choose all that apply)

A combination capital letter, number and symbols/special charatcters

Using a phrase like "iloveManU"

Enabling 2 factor authentication

using password as a password

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these was not one of the most common passwords of 2015

Tqbfj0t1d

1234

Password

qwerty

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Use of fingerprints, retina scans, or other body features as an authentication mechanism is known as.

TFA

Biometrics

Firewalls

2FA

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of authentication method identifies and recognizes people based on physical traits such as fingerprints?

digital certificates
WEP
biometrics
RADIUS

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What security method analyses the characteristics of an individual's face via images captured through a digital video camera?

Facial Recognition

Hand Geometry Scanning

Iris Scanning

Fingerprint Recognition

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers